{"id":"ALPINE-CVE-2017-7702","details":"In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.","modified":"2025-11-19T06:11:06.502391Z","published":"2017-04-12T23:59:00.230Z","upstream":["CVE-2017-7702"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2017-7702"}],"affected":[{"package":{"name":"wireshark","ecosystem":"Alpine:v3.5","purl":"pkg:apk/alpine/wireshark?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.6-r0"}]}],"versions":["1.10.0-r0","1.10.1-r0","1.10.2-r0","1.10.2-r1","1.10.3-r0","1.10.3-r1","1.10.4-r0","1.10.5-r0","1.10.5-r1","1.10.6-r0","1.10.7-r0","1.10.8-r0","1.12.0-r0","1.12.0-r1","1.12.1-r0","1.12.1-r1","1.12.2-r0","1.12.3-r0","1.12.4-r0","1.12.4-r1","1.12.5-r0","1.12.7-r0","1.12.8-r0","1.2.1-r0","1.2.10-r0","1.2.2-r0","1.2.4-r0","1.2.6-r0","1.2.6-r1","1.2.6-r2","1.2.8-r0","1.2.9-r0","1.4.0-r0","1.4.1-r0","1.4.2-r0","1.4.3-r0","1.4.4-r0","1.4.5-r0","1.4.6-r0","1.4.7-r0","1.6.0-r0","1.6.0-r1","1.6.1-r0","1.6.2-r0","1.6.3-r0","1.6.4-r0","1.6.5-r0","1.6.6-r0","1.6.6-r1","1.6.8-r0","1.6.8-r1","1.8.1-r0","1.8.2-r0","1.8.3-r0","1.8.4-r0","1.8.5-r0","1.8.6-r0","1.8.7-r0","2.0.0-r0","2.0.1-r0","2.0.2-r0","2.0.3-r0","2.0.4-r0","2.0.5-r0","2.2.0-r0","2.2.0-r1","2.2.2-r0","2.2.3-r0","2.2.4-r0","2.2.4-r1","2.2.5-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2017-7702.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}